@auth/dgraph-adapter
Official Dgraph adapter for Auth.js / NextAuth.js.
Installationβ
- npm
- Yarn
- pnpm
npm install next-auth @auth/dgraph-adapter
yarn add next-auth @auth/dgraph-adapter
pnpm add next-auth @auth/dgraph-adapter
DgraphAdapter()β
DgraphAdapter(
client,options?):Adapter
Setupβ
Add this adapter to your pages/api/[...nextauth].js next-auth configuration object:
import NextAuth from "next-auth"
import { DgraphAdapter } from "@auth/dgraph-adapter"
export default NextAuth({
  providers: [],
  adapter: DgraphAdapter({
    endpoint: process.env.DGRAPH_GRAPHQL_ENDPOINT,
    authToken: process.env.DGRAPH_GRAPHQL_KEY,
    // you can omit the following properties if you are running an unsecure schema
    authHeader: process.env.AUTH_HEADER, // default: "Authorization",
    jwtSecret: process.env.SECRET,
  }),
})
Unsecure schemaβ
The quickest way to use Dgraph is by applying the unsecure schema to your local Dgraph instance or if using Dgraph cloud you can paste the schema in the codebox to update.
This approach is not secure or for production use, and does not require a jwtSecret.
This schema is adapted for use in Dgraph and based upon our main schema
Exampleβ
 type Account {
   id: ID
   type: String
   provider: String @search(by: [hash])
   providerAccountId: String @search(by: [hash])
   refreshToken: String
   expires_at: Int64
   accessToken: String
   token_type: String
   refresh_token: String
   access_token: String
   scope: String
   id_token: String
   session_state: String
   user: User @hasInverse(field: "accounts")
 }
 type Session {
   id: ID
   expires: DateTime
   sessionToken: String @search(by: [hash])
   user: User @hasInverse(field: "sessions")
 }
 type User {
   id: ID
   name: String
   email: String @search(by: [hash])
   emailVerified: DateTime
   image: String
   accounts: [Account] @hasInverse(field: "user")
   sessions: [Session] @hasInverse(field: "user")
 }
 type VerificationToken {
   id: ID
   identifier: String @search(by: [hash])
   token: String @search(by: [hash])
   expires: DateTime
 }
Secure schemaβ
For production deployments you will want to restrict the access to the types used
by next-auth. The main form of access control used in Dgraph is via @auth directive alongside types in the schema.
Exampleβ
type Account
  @auth(
    delete: { rule: "{$nextAuth: { eq: true } }" }
    add: { rule: "{$nextAuth: { eq: true } }" }
    query: { rule: "{$nextAuth: { eq: true } }" }
    update: { rule: "{$nextAuth: { eq: true } }" }
  ) {
  id: ID
  type: String
  provider: String @search(by: [hash])
  providerAccountId: String @search(by: [hash])
  refreshToken: String
  expires_at: Int64
  accessToken: String
  token_type: String
  refresh_token: String
  access_token: String
  scope: String
  id_token: String
  session_state: String
  user: User @hasInverse(field: "accounts")
}
type Session
  @auth(
    delete: { rule: "{$nextAuth: { eq: true } }" }
    add: { rule: "{$nextAuth: { eq: true } }" }
    query: { rule: "{$nextAuth: { eq: true } }" }
    update: { rule: "{$nextAuth: { eq: true } }" }
  ) {
  id: ID
  expires: DateTime
  sessionToken: String @search(by: [hash])
  user: User @hasInverse(field: "sessions")
}
type User
  @auth(
    query: {
      or: [
        {
          rule: """
          query ($userId: String!) {queryUser(filter: { id: { eq: $userId } } ) {id}}
          """
        }
        { rule: "{$nextAuth: { eq: true } }" }
      ]
    }
    delete: { rule: "{$nextAuth: { eq: true } }" }
    add: { rule: "{$nextAuth: { eq: true } }" }
    update: {
      or: [
        {
          rule: """
          query ($userId: String!) {queryUser(filter: { id: { eq: $userId } } ) {id}}
          """
        }
        { rule: "{$nextAuth: { eq: true } }" }
      ]
    }
  ) {
  id: ID
  name: String
  email: String @search(by: [hash])
  emailVerified: DateTime
  image: String
  accounts: [Account] @hasInverse(field: "user")
  sessions: [Session] @hasInverse(field: "user")
}
type VerificationToken
  @auth(
    delete: { rule: "{$nextAuth: { eq: true } }" }
    add: { rule: "{$nextAuth: { eq: true } }" }
    query: { rule: "{$nextAuth: { eq: true } }" }
    update: { rule: "{$nextAuth: { eq: true } }" }
  ) {
  id: ID
  identifier: String @search(by: [hash])
  token: String @search(by: [hash])
  expires: DateTime
}
# Dgraph.Authorization {"VerificationKey":"<YOUR JWT SECRET HERE>","Header":"<YOUR AUTH HEADER HERE>","Namespace":"<YOUR CUSTOM NAMESPACE HERE>","Algo":"HS256"}
Dgraph.Authorizationβ
In order to secure your graphql backend define the Dgraph.Authorization object at the
bottom of your schema and provide authHeader and jwtSecret values to the DgraphClient.
# Dgraph.Authorization {"VerificationKey":"<YOUR JWT SECRET HERE>","Header":"<YOUR AUTH HEADER HERE>","Namespace":"YOUR CUSTOM NAMESPACE HERE","Algo":"HS256"}
VerificationKey and jwtSecretβ
This is the key used to sign the JWT. Ex. process.env.SECRET or process.env.APP_SECRET.
Header and authHeaderβ
The Header tells Dgraph where to lookup a JWT within the headers of the incoming requests made to the dgraph server.
You have to configure it at the bottom of your schema file. This header is the same as the authHeader property you
provide when you instantiate the DgraphClient.
The nextAuth secretβ
The $nextAuth secret is securely generated using the jwtSecret and injected by the DgraphAdapter in order to allow interacting with the JWT DgraphClient for anonymous user requests made within the system ie. login, register. This allows
secure interactions to be made with all the auth types required by next-auth. You have to specify it for each auth rule of
each type defined in your secure schema.
type VerificationRequest
  @auth(
    delete: { rule: "{$nextAuth: { eq: true } }" },
    add: { rule: "{$nextAuth: { eq: true } }" },
    query: { rule: "{$nextAuth: { eq: true } }" },
    update: { rule: "{$nextAuth: { eq: true } }" }
  ) {
 ...
}
JWT session and @auth directiveβ
Dgraph only works with HS256 or RS256 algorithms. If you want to use session jwt to securely interact with your dgraph
database you must customize next-auth encode and decode functions, as the default algorithm is HS512. You can
further customize the jwt with roles if you want to implement RBAC logic.
import * as jwt from "jsonwebtoken"
export default NextAuth({
  session: {
    strategy: "jwt",
  },
  jwt: {
    secret: process.env.SECRET,
    encode: async ({ secret, token }) => {
      return jwt.sign({ ...token, userId: token.id }, secret, {
        algorithm: "HS256",
        expiresIn: 30 * 24 * 60 * 60, // 30 days
      })
    },
    decode: async ({ secret, token }) => {
      return jwt.verify(token, secret, { algorithms: ["HS256"] })
    },
  },
})
Once your Dgraph.Authorization is defined in your schema and the JWT settings are set, this will allow you to define
@auth rules for every part of your schema.
Parametersβ
βͺ client: DgraphClientParams
βͺ options?: DgraphAdapterOptions
Returnsβ
Adapter
DgraphAdapterOptionsβ
This is the interface of the Dgraph adapter options.
Propertiesβ
fragmentsβ
fragments?:
object
The GraphQL Fragments you can supply to the adapter
to define how the shapes of the user, account, session, verificationToken entities look.
By default the adapter will uses the default defined fragments , this config option allows to extend them.
Type declarationβ
Accountβ
Account?:
string
Sessionβ
Session?:
string
Userβ
User?:
string
VerificationTokenβ
VerificationToken?:
string